Home / Lugar Celebracion Summer Bootcamp / Webinar
Subscribe to RSS - Webinar



Practical research procedure in hacktivism cases

Posted on 06/14/2021
  • Speakers: Iván Portillo Morales and Gonzalo Espinosa Lázaro
  • Topic: cyber threat intelligence.
  • Content of the workshop:
    • The threat to be addressed (Hacktivism).
    • Development of the case study:
      • Phase 1: Direction and Planning.
      • Phase 2: Procurement.
      • Phase 3: Analysis and Elaboration.
      • Phase 4: Dissemination
    • Conclusions and summing up.

Research techniques using Open Source INTelligence techniques

Posted on 06/14/2021
  • Speaker: Carlos Seisdedos
  • Topic: Open Source INTelligence (OSINT).
  • Content of the workshop:
    • Intelligence.
    • Securing the working environment.
    • Website research.
    • Investigation of natural persons.
    • Investigation of legal persons.
    • Gathering information on social networks.
    • Social network analysis.
    • Presentation of results.
    • Final online test.

Comprehensive memory forensic malware analysis

Posted on 06/14/2021
  • Speaker: Ricardo J. Rodríguez
  • Topic: Digital Forensics and Incident Response (DFIR).
  • Content of the workshop:
    • Introduction (memory forensics, process forensics, malware, incident response).
    • Preliminary concepts (structure of a process on Windows and Linux).
    • Phases of malware analysis vs. phases of forensic analysis.
    • Collecting information of interest through Volatility.
    • Detecting indicators of compromise.
    • Development of own analysis tools.

Investigation of cryptocurrency-related crime

Posted on 06/14/2021
  • Speaker: Carlos Cilleruelo
  • Topic: cryptocurrencies and bank fraud.
  • Content of the workshop:
    • Context of the use of cryptocurrencies. Not everything is Bitcoin, explaining that there are multiple types, each with its own characteristics. 
    • What crimes are associated with cryptocurrencies? What cryptocurrencies are used in crime?
    • Use of cryptocurrencies in dark markets. Operation of markets for the sale of drugs or weapons on darknets. 

Applied steganography - Detection in forensic scenarios. From stegomalware to polyglots.

Posted on 06/14/2021
  • Speaker: Alfonso Muñoz Muñoz
  • Topic: forensic analysis.
  • Content of the workshop:
    • Brief overview of the limitation of cryptography in system attacks and cybercrime.
    • Steganography. Definition of concepts and classification of techniques.
    • Steganography in multimedia content. Concealment and detection.
    • Network steganography and covert channels in system breaches.
    • Steganography and malware. Stegomalware and polyglots.

Forensic action. Real case of credit card theft in e-commerce

Posted on 06/14/2021
  • Speaker: Yago Fernández Hansen
  • Topic: Digital Forensics and Incident Response (DFIR).
  • Content of the workshop:
    • Presentation of the workshop. Summary of contents.
    • Downloading of the forensic tool by attendees
    • Introduction to the actual incident. Credit card theft on a website.
    • Premises for action
    • Planning
    • Obtaining information on infrastructure
    • Hands-on lab
    • Conclusions, AOCB

Cyber ​​research methodology for National Security

Posted on 06/14/2021
  • Temática: Intelligence in police investigations.
  • Content of the workshop:
    • Introduction to the workshop.
    • Case study development. 
      • Steering and planning phase.
      • Procurement phase.
      • Preparation phase.
      • Dissemination phase.
    • Conclusions.

Police intelligence and the use of new technologies

Posted on 06/14/2021
  • Speaker: Carlos Loureiro Montero
  • Topic: intelligence in police investigations
  • Content of the workshop:
    • What is Police Intelligence?
    • Applications and areas of police intelligence.
    • Police Intelligence and new technologies.
    • Brief overview of use cases of Machine Learning in Police Intelligence.
    • What is Knime?
    • Brief introduction to the platform.
    • Step-by-step use of Knime for predicting terrorist actions.
    • Example if practice in use